]> review.fuel-infra Code Review - puppet-modules/puppetlabs-firewall.git/commit
(MODULES-439) Work around existing rules
authorHunter Haugen <hunter@puppetlabs.com>
Tue, 28 Jan 2014 01:31:22 +0000 (17:31 -0800)
committerHunter Haugen <hunter@puppetlabs.com>
Tue, 28 Jan 2014 18:36:44 +0000 (10:36 -0800)
commit2ec07247a2c16f749daddde4a00730e983b039f1
tree06a697c9dff00252dd08e02441896157b91c49e9
parentac07643b0962cbdf43b2c5cae0c4fbe0351a460e
(MODULES-439) Work around existing rules

The firewall resource is not intended to be used with rules that are not
also managed by puppet; the behavior when doing so was undefined. This
is an attempt to make it more defined.

The behavior is that any rule added by puppet will be inserted in its
given order in relation to the other rules managed by puppet, but ahead
of any rules not managed by puppet.
14 files changed:
Gemfile
lib/puppet/provider/firewall/iptables.rb
spec/acceptance/change_source_spec.rb [new file with mode: 0644]
spec/acceptance/nodesets/centos-59-x64.yml
spec/acceptance/nodesets/centos-64-x64-fusion.yml [new file with mode: 0644]
spec/acceptance/nodesets/centos-64-x64-pe.yml [new file with mode: 0644]
spec/acceptance/nodesets/centos-64-x64.yml
spec/acceptance/nodesets/debian-607-x64.yml [new file with mode: 0644]
spec/acceptance/nodesets/debian-70rc1-x64.yml [new file with mode: 0644]
spec/acceptance/nodesets/fedora-18-x64.yml [new file with mode: 0644]
spec/acceptance/nodesets/sles-11sp1-x64.yml [new file with mode: 0644]
spec/acceptance/nodesets/ubuntu-server-10044-x64.yml [new file with mode: 0644]
spec/acceptance/nodesets/ubuntu-server-12042-x64.yml
spec/unit/puppet/provider/iptables_spec.rb